YouTube doesn't want you know this subscribers secret
Get Free YouTube Subscribers, Views and Likes

Demystifying the quantum crypto threat

Follow
Attack Detect Defend (rot169)

Welcome to the first in a series of videos on post quantum cryptography, where we start with a view on the real risk that quantum computing poses today, and an overview of what we as cyber security professionals can do to overcome those risks. We touch on the pros and cons of quantum random number generation, quantum key exchange, and quantumresistant algorithms selected for standardisation by NIST.

References:
NIST’s PostQuantum Crypto Homepage: https://csrc.nist.gov/projects/postq...
NCSC’s QuantumSafe Cryptography Whitepaper: https://www.ncsc.gov.uk/whitepaper/pr...

Timecodes:
0:00 Intro
0:49 Quantum Physics
1:16 Quantum Computing
2:12 Cracking Crypto with Quantum Computers
4:39 Quantum Cryptography
5:17 Quantum Random Number Generation
7:14 Quantum Key Exchange
8:37 QuantumResistant Cryptography
11:39 Roundup

Credits:
Intro/Outro Music: Render Prism:    • Render  Prism [Creative Commons]   (via Argofox:    / argofox  )
Diagram icons designed by OpenMoji (https://openmoji.org/) CC BYSA 4.0

posted by ruffly15